Note: Though all authentication methods can be applied to internal or external servers, some authentication methods may not make sense for a DMZ environment. For more information about Web Conferencing support for DMZ environments, see the Configuring External Access to Web Conferencing chapter.